Uploaded by International Research Journal of Engineering and Technology (IRJET)

IRJET- Protection of Personal Data on Distributed Cloud using Biometrics

advertisement
International Research Journal of Engineering and Technology (IRJET)
e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019
p-ISSN: 2395-0072
www.irjet.net
Protection of Personal Data on Distributed Cloud using Biometrics
Gangamma B N1, Sindhura H R2,, Shubha K Shetti3, Kusuma B R4, Mrs.Jayasri B S5
1,2,3,4Student,
CSE/The National Institute of Engineering, Mysuru, Karnataka, India
Professor, CSE/The National Institute of Engineering, Mysuru, Karnataka, India
---------------------------------------------------------------------***--------------------------------------------------------------------5Associate
Abstract - The proposed system aims at providing a secure
There is increasing demand for usage of cloud. The user can
store his personal documents in cloud and perform various
types of computations on it. However, the security issues
related to the data stored in cloud poses a threat. In the
existing system, the user stores his documents in a single
cloud. Therefore, when a hacker gets access to this cloud by
some means then he can get all the information stored [2].
and efficient solution to end users to access their own personal
files in the cloud servers using biometric authentication.
Biometric fingerprint scanner is used for the processing of
finger print based authentication. The user’s own personal
files are stored in the free public multiple cloud storages
namely AWS and Google drive using two techniques called
splitting and merging techniques. Rijndael algorithm will
improve the security in cloud environment. Files or details are
stored in multiple clouds using cryptographic techniques. Data
gets split into fragments and gets stored in various distinct
cloud servers with encrypted key. At once the authorized token
for the specific is requested by the user, the cloud server
performs a keyword based on the search's encrypted data and
combines the fragments, this is sent to the verifier for the
verification.
Key Words: Cloud Computing, Fingerprint, Rijndael
algorithm, AWS, Google drive.
Drawbacks in the existing system1) Safety of the data is compromised. Since the data is not
encrypted the hacker can easily get the information.
2) Single cloud storage poses a threat. Since the user stores
all the information on single cloud if the security of the cloud
is not good enough then the cloud can be hacked to get the
information[1].
2. PROPOSED SYSTEM
This system is proposed to provide a security and efficient
solution to end users to access their own personal files in the
cloud servers using biometric authentication. Required
algorithm is implemented for the processing of finger print
based authentication. The user’s personal files are stored in
the free public multiple cloud storages and the algorithm will
improve the security in cloud environment.
Advantages of the proposed system-
1. INTRODUCTION
In daily life, though Cloud computing plays an important role
however it invokes various security threats such as Phishing,
Session Hijacking, Malicious software and wire-less
connection vulnerabilities[1]. In this project, secured
architecture for storing end user’s necessary data like Birth
certificate, Death certificate, Academic certificate, Transfer
certificate, Passport and other personal and important
details in Cloud. The proposed architecture focuses on
Finger print based user authentication onto access the detail
in the cloud computing. For each and every individual a
special or unique signature/pattern are obtained. The
proposed architecture involves multiple cloud storage. The
feature extraction and matching is performed using required
algorithm for the finger print. Presently Finger print sensor
has been integrated in all Laptops, personal computers and
mobile devices, so it can use the in-built sensor or
integrating an external user finger print sensor can
authenticate, store/ download the respective data. The
document is split into the fragments and stored in the AWS
and Google Drive. Using encryption algorithm, the fragments
are encrypted and stored in the cloud servers.
1) Safety of the data is enhanced. Since the data is encrypted
using encrypting keys, though it is hacked the hacker cannot
access the data hacked.
2) This project gives a special solution invoking security in
single/multiple cloud storages. It is secured and requires
less processing time for the Rijndael encryption algorithm
when compared with other algorithms.
3) Our proposed architecture also involves multiple cloud
storage system, the user files get converted into fragments,
split and stored data in cloud storages[2].
1.1 Existing System
Cloud computing refers to the practice of using the network
of remote servers hosted on internet to store, manage and
process data rather than a local server or personal computer.
© 2019, IRJET
|
Impact Factor value: 7.211
|
ISO 9001:2008 Certified Journal
|
Page 4119
International Research Journal of Engineering and Technology (IRJET)
e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019
p-ISSN: 2395-0072
www.irjet.net
be asked to register his fingerprint. If the details are valid the
registration is successful. For the subsequent access to the
system the user can directly login to the system by verifying
his fingerprint and entering his password. After successful
verification, the user will be directed to the homepage where
the user can split the document, upload the document, and
download the document.
Fragmentation Module
This module enables the user to plan the fragmentation for
the data to be stored on the multiple clouds. The user can
split the documents according to his needs. Each file can be
split into multiple parts with each part having different
size[3]. The size of each fragment is decided by the user. The
number of pieces to be made is also left to choice of user. The
total size and remaining size after forming each piece is
displayed for user reference. The fragmented parts are
stored along with a merger file. This merger file contains the
number of bytes in each of the parts along with the start and
end bytes. This is helpful for the merging process in
download module.
Upload File Module
This module helps the user to upload the fragmented files to
multiple clouds. To each of the fragment generated an
encryption algorithm named Rijndael[4] is applied. Once the
encryption algorithm is applied a metadata file is created
containing the secret key. This metadata file will be stored in
the local server thus preventing it from being corrupted or
hacked. Finally the files can be uploaded onto AWS and
Google Drive.
Fig -1: Architecture
The system architecture as shown in the fig 1 provides a
secure and efficient solution to end users to store and access
their own personal files in the cloud servers using biometric
authentication. Required algorithm is implemented for the
processing of finger print based authentication. The user’s
own personal files are stored in the public multiple cloud
storages (AWS and Google drive). The user can decide the
number of parts to be made as well as the size of each of the
part. Once the splitting process is done he can upload the
parts onto the clouds. These parts are first encrypted using
Rijndael algorithm and the encrypted parts are uploaded
onto clouds. The key used for encryption is stored in an XML
file in user’s local folder. The parts are stored in alternative
manner in AWS S3 buckets[5] and Google drive[6]. When
the user wants to download the file, he has to first upload the
XML file that contains the key, Based on this, the parts are
obtained from AWS and Google drive and decrypted using
Rijndael algorithm. The parts are merged and the entire file
gets downloaded.
2.1 Implementation
Registration and Login Module
Fig -2: File Upload
Registration and Login module are provided for the user
access to the system. The user who is accessing the system
for the first time will be asked to register himself to the
system, by providing his basic information like his name,
contact number, email id, address etc., along with this he will
© 2019, IRJET
|
Impact Factor value: 7.211
Download File Module
Finally to download the file stored in multiple clouds, the
user has to upload the metadata file that contains the
encryption key. The rijndael decryption algorithm decrypts
|
ISO 9001:2008 Certified Journal
|
Page 4120
International Research Journal of Engineering and Technology (IRJET)
e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019
p-ISSN: 2395-0072
www.irjet.net
the parts into original format using the merger file generated
in fragmentation module. All the individual parts get merged
to a complete file and gets downloaded[3].
[3] A.N.Vinodhini, Dr.S.Ayyasamy. Prevention of Personal
Data in Cloud Computing Using Bio-Metric. IEEE
International Conference on Innovations in Green Energy
and Healthcare Technologies(ICIGEHT’17).
[4] How does the encryption algorithm Rijndael work?
https://www.passworddepot.de/en/knowhow/blowfish_and_rijndael.htm
[5]Amazon Web Services-http://www.wikipedia.com/aws.
[6] Google Drive-https://www.cloudwards.net/how-doesgoogle-drive-work/.
Fig -3: File Download
3. CONCLUSION
This system gives a special solution invoking security in
single/multiple cloud storages. Our proposed architecture
involves multiple cloud storage system, the user files are
split into fragments, encrypted using Rijndael encryption
algorithm and stored data in two cloud storages namely AWS
and Google drive. The study results shows Rijndael
algorithm as secured and requires less processing time. This
system deals with the enhancement of security to cloud
servers by implementation detection and prevention
techniques against cyber attacks. Safety of the data is
enhanced in this system. Hence this architecture provides
complete secure access/storage of data across multiple
clouds. In future, we can add more number of clouds and
also keep a backup copy of each of the parts. Also it can be
improvised by integrating other biometric authentication.
REFERENCES
[1] Hubbard D, Sutton M.Top treats to Cloud Computing V
1.0 : http://www.cloudsecurityalliance.org/topthreats
[2] Bohli J M,Jensen M.Security and Privacy-Enhancing
Multicloud Architectures.2013 August:10(4):212-224.
© 2019, IRJET
|
Impact Factor value: 7.211
|
ISO 9001:2008 Certified Journal
|
Page 4121
Download